The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud users have little visibility into the performance characteristics and utilization of the physical machines underpinning the virtualized cloud resources they use. This uncertainty forces users and researchers to reverse engineer the inner workings of cloud systems in order to understand and optimize the conditions their applications operate. At Massachusetts Open Cloud (MOC), as a public cloud...
There is no doubt that security issues are on the rise and defense mechanisms are becoming one of the leading subjects for academic and industry experts. In this paper, we focus on the security domain and envision a new way of looking at the security life cycle. We utilize our vision to propose an asset-based approach to countermeasure zero day attacks. To evaluate our proposal, we built a prototype...
A service-oriented architecture (SOA)-based application is composed of a number of distributed and loosely-coupled services which are interconnected to accomplish a more complex functionality. The main security challenge in SOA is that we cannot trust the participating services in a service composition to behave as expected all the time. Moreover, the chain of all services involved in an end-to-end...
The efforts and findings of the last decades of research on the formalization and the verification of Web services have given a certain level of assurance on Web services. However new challenges such as high availability and security issues are not fully addressed. In fact, Web services are exposed to attacks that appear continuously. These issues have naturally paved the way to a new research topic...
In today's knowledge society data plays a central role. Large parts of an organization's critical data currently resides in databases which makes them an attractive target for cyber-attacker. The increasing digitization and interconnection of organizations combined with growing complexity of IT systems led to increased attack surface of most organizations. At the same time cyber-adversaries increased...
Stray voltages have always been a concern to utility companies and customers. But methods to troubleshoot and monitor nonroutine stray voltage problems are very limited. This paper presents a passive, measurement-based method to identify the contributors to the common cause of stray voltages, the neutral-to-earth voltage (NEV) rise at the service entrance point. The paper shows that the NEV can be...
In Indonesia, the uses of Machine to Machine (M2M) solutions continue to grow in various sectors of industry which were supported by the increasing of mobile technology usage. The number of electricity customers in Indonesia especially residential customers was 92.81% and became the highest compared to other customer groups. Since the market potential of residential customers group was quite high,...
The storage of large amounts of network data is a challenging problem, in particular if it still needs to be actively consulted as for example in the case of network forensics. Here we propose a method to compress NetFlow data while simultaneously adding domain knowledge. Our method is based on a pattern classification scheme by considering all flows from a single source IP address simultaneously...
Protecting intellectual property and confidential customer details from network based attacks is becoming increasingly difficult in modern times due to a dramatic increase in online based attacks. For companies such as The NPD Group, protecting this confidential information is key in keeping a positive perceived image while also doing its utmost to protect vital I. P. This paper proposes an architecture...
APT attack has caused chaos in society since 2006. Especially, the vulnerability of the infrastructure is exposed to the outside a lot due to the development of the IT infrastructure in Korea. In addition, APT attacks targeting companies' major confidential information are increasing every year. APT attack causes negative publicity for the company and financial damage. APT is completely different...
As organizations constantly strive to improve strategies for ICT management, one of the major challenges they must tackle is bring your own device (BYOD). BYOD is a term that collectively refers to the related technologies, concepts, and policies in which employees are allowed to access internal corporate IT resources, such as databases and applications, using their personal mobile devices like smartphones,...
The solutions of security problems and crisis situations are accompanied by many specific traits. Some of them are typical for all crisis situations, some of them denote the one singular form of crisis only. One common trait of crisis situations is shortage of time and information which places high demands on managers and decision-makers. Contemporary opinions about the solution of crisis situation...
With the rising popularity of Web applications and cloud computing technology, a secure cloud computing environment is one of the main concerns. Currently, enterprise cloud platforms often rely on their maintenance and operation, and medium and small companies cannot effectively save manpower information security costs, and thus has affected the willingness of enterprises to use cloud services. In...
Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With the cloud computing, the market's entrance time is reduced, computing capabilities is augmented and computing power is really limitless. Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing their data. Nevertheless, the management of data and...
Information disclosure is a critical determinant of portfolio allocation in capital markets. Securities analysts as important “information traders”, their follow-up behavior and information disclosure of the firms they follow participate in an interaction relationship. This paper sheds light on the three different roles of analysts. Based on the perspective of role of analysts, we reviewed relevant...
All Cloud computing standards are dependent upon checklist methodology to implement and then audit the alignment of a company or an operation with the standards that have been set. An investigation of the use of checklists in other academic areas has shown there to be significant weaknesses in the checklist solution to both implementation and audit, these weaknesses will only be exacerbated by the...
With the popularization of high-speed and high-capacity communication networks, Machine-to-Machine (M2M) communication has received significant attention. However, even though the related technologies have been actively investigated, creating new businesses based on M2M communication is not easy. This paper proposes a service innovation structure that visualizes the opportunities and difficulties...
We are seeing the deployment of new types of networks such as sensor networks for environmental and infrastructural monitoring, social networks such as facebook, and e-Health networks for patient monitoring. These networks are producing large amounts of data that need to be stored, processed and analysed. Cloud technology is being used to meet these challenges. However, a key issue is how to provide...
Nowadays information and automation technology infrastructures, as used in Critical Infrastructures, manufacturing plants or distributed sensor networks, have become very complex and dependant to automation. This does not only demand for higher bandwidths and bit rates in connecting network technologies, furthermore major security issues arise as seen over the last years. The vision of secure information...
Cloud computing provides a large pool of accessible resources (hardware, platform, software) in a form of services. It became a cost effective alternative to the traditional IT infrastructure. Nowadays, as more and more e-commerce companies delegate their task to cloud providers, Services Level Agreement (SLA) became an important aspect between the cloud consumer and cloud provider, the dynamic nature...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.